
CVE-2021-24045
https://notcve.org/view.php?id=CVE-2021-24045
13 Dec 2021 — A type confusion vulnerability could be triggered when resolving the "typeof" unary operator in Facebook Hermes prior to v0.10.0. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected. Una vulnerabilidad de confusión de tipo podría ser desencadenada al resolver el operador unario "typeof" en Facebook Hermes versiones anteriores a v0.10.0. Tenga en cuenta que esto sólo es explotable si la aplicació... • https://github.com/facebook/hermes/commit/55e1b2343f4deb1a1b5726cfe1e23b2068217ff2 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVE-2019-3556
https://notcve.org/view.php?id=CVE-2019-3556
26 Oct 2021 — HHVM supports the use of an "admin" server which accepts administrative requests over HTTP. One of those request handlers, dump-pcre-cache, can be used to output cached regular expressions from the current execution context into a file. The handler takes a parameter which specifies where on the filesystem to write this data. The parameter is not validated, allowing a malicious user to overwrite arbitrary files where the user running HHVM has write access. This issue affects HHVM versions prior to 4.56.2, al... • https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2021-39207 – Deserialization of Untrusted Data in parlai
https://notcve.org/view.php?id=CVE-2021-39207
10 Sep 2021 — parlai is a framework for training and evaluating AI models on a variety of openly available dialogue datasets. In affected versions the package is vulnerable to YAML deserialization attack caused by unsafe loading which leads to Arbitary code execution. This security bug is patched by avoiding unsafe loader users should update to version above v1.1.0. If upgrading is not possible then users can change the Loader used to SafeLoader as a workaround. See commit 507d066ef432ea27d3e201da08009872a2f37725 for det... • https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879 • CWE-502: Deserialization of Untrusted Data •

CVE-2021-24040 – Facebook ParlAI 1.0.0 - Deserialization of Untrusted Data in parlai
https://notcve.org/view.php?id=CVE-2021-24040
10 Sep 2021 — Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0. Debido al uso de una lógica de deserialización de YAML no segura, un atacante con la capacidad de modificar los archivos de configuración YAML locales podría proporcionar una entrada maliciosa, resultando en una ejecución de código remota o riesgos similares. Este p... • https://packetstorm.news/files/id/164136 • CWE-502: Deserialization of Untrusted Data •

CVE-2021-24036
https://notcve.org/view.php?id=CVE-2021-24036
23 Jul 2021 — Passing an attacker controlled size when creating an IOBuf could cause integer overflow, leading to an out of bounds write on the heap with the possibility of remote code execution. This issue affects versions of folly prior to v2021.07.22.00. This issue affects HHVM versions prior to 4.80.5, all versions between 4.81.0 and 4.102.1, all versions between 4.103.0 and 4.113.0, and versions 4.114.0, 4.115.0, 4.116.0, 4.117.0, 4.118.0 and 4.118.1. Pasar un tamaño controlado por un atacante al crear un IOBuf podr... • https://github.com/facebook/folly/commit/4f304af1411e68851bdd00ef6140e9de4616f7d3 • CWE-122: Heap-based Buffer Overflow CWE-190: Integer Overflow or Wraparound •

CVE-2021-24037
https://notcve.org/view.php?id=CVE-2021-24037
15 Jun 2021 — A use after free in hermes, while emitting certain error messages, prior to commit d86e185e485b6330216dee8e854455c694e3a36e allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected. Un uso de la memoria previamente liberada en hermes, mientras se emiten determinados mensajes de error, antes del commit d86e185e485b6330216de... • https://github.com/facebook/hermes/commit/d86e185e485b6330216dee8e854455c694e3a36e • CWE-416: Use After Free •

CVE-2020-1920
https://notcve.org/view.php?id=CVE-2020-1920
01 Jun 2021 — A regular expression denial of service (ReDoS) vulnerability in the validateBaseUrl function can cause the application to use excessive resources, become unresponsive, or crash. This was introduced in react-native version 0.59.0 and fixed in version 0.64.1. Una vulnerabilidad de Denegación de Servicio de expresión regular (ReDoS) en la función validateBaseUrl puede hacer que la aplicación utilice recursos excesivos, deje de responder o se bloquee. Esto se introdujo en versión 0.59.0 de react-native y se cor... • https://github.com/facebook/react-native/commit/ca09ae82715e33c9ac77b3fa55495cf84ba891c7 • CWE-697: Incorrect Comparison CWE-1333: Inefficient Regular Expression Complexity •

CVE-2021-24028
https://notcve.org/view.php?id=CVE-2021-24028
13 Apr 2021 — An invalid free in Thrift's table-based serialization can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2021.02.22.00. Una liberación no válida en la serialización basada en tablas de Thrift puede causar que la aplicación se bloquee o potencialmente resultar en una ejecución de código u otros efectos no deseados. Este problema afecta a Facebook Thrift versiones anteriores a v2021.02.22.00 • https://github.com/facebook/fbthrift/commit/bfda1efa547dce11a38592820916db01b05b9339 • CWE-763: Release of Invalid Pointer or Reference •

CVE-2021-24217 – Facebook for WordPress < 3.0.0 - PHP Object Injection with POP Chain
https://notcve.org/view.php?id=CVE-2021-24217
25 Mar 2021 — The run_action function of the Facebook for WordPress plugin before 3.0.0 deserializes user supplied data making it possible for PHP objects to be supplied creating an Object Injection vulnerability. There was also a useable magic method in the plugin that could be used to achieve remote code execution. La función run_action del plugin de Facebook para WordPress versiones anteriores a 3.0.0, deserializa unos datos suministrados por el usuario, haciendo posible que sean suministrados objetos PHP creando una ... • https://wpscan.com/vulnerability/509f2754-a1a1-4142-9126-ae023a88533a • CWE-502: Deserialization of Untrusted Data •

CVE-2021-24218 – Facebook for WordPress 3.0.0-3.0.3 - CSRF to Stored XSS and Settings Deletion
https://notcve.org/view.php?id=CVE-2021-24218
25 Mar 2021 — The wp_ajax_save_fbe_settings and wp_ajax_delete_fbe_settings AJAX actions of the Facebook for WordPress plugin before 3.0.4 were vulnerable to CSRF due to a lack of nonce protection. The settings in the saveFbeSettings function had no sanitization allowing for script tags to be saved. Las acciones AJAX wp_ajax_save_fbe_settings y wp_ajax_delete_fbe_settings del plugin de Facebook para WordPress versiones anteriores a 3.0.4, eran vulnerables a un ataque de tipo CSRF debido a una falta de protección nonce.... • https://wpscan.com/vulnerability/169d21fc-d191-46ff-82e8-9ac887aed8a4 • CWE-352: Cross-Site Request Forgery (CSRF) •